A novel (n, t, n) secret image sharing scheme without a trusted third party

被引:7
|
作者
Guo, Cheng [1 ]
Chang, Chin-Chen [2 ,3 ]
Qin, Chuan [2 ]
机构
[1] Dalian Univ Technol, Sch Software, Dalian 116620, Peoples R China
[2] Feng Chia Univ, Dept Informat Engn & Comp Sci, Taichung 40724, Taiwan
[3] Chinese Med Univ, Dept Biomed Imaging & Radiol Sci, Taichung 40402, Taiwan
关键词
(n; t; n) secret sharing; Modulo operator; Additive homomorphism; Secret image sharing; Trusted third party; SMALLER SHADOW IMAGES; CELLULAR-AUTOMATA; STEGANOGRAPHY; AUTHENTICATION;
D O I
10.1007/s11042-013-1510-0
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Secret image sharing is a technique to share a secret image among a set of n participants. A trusted third party embeds the secret image into the cover image to generate shadow images such that at least t or more shadow images can reconstruct the secret image. In this paper, we consider an extreme and real-world situation, in which there is no one who is trusted by anyone else. In the proposed scheme, the participants can act as a dealer and communicate with each other in a secret channel. Each participant can generate her/his own shadow image independently, according to the cover image and the secret image. Experimental results are provided to show that the shadow images have satisfactory quality. In addition, our scheme has a large embedding capacity, and the secret image can be reconstructed losslessly.
引用
收藏
页码:2195 / 2209
页数:15
相关论文
共 50 条
  • [31] DSIS: A NOVEL (K,N) THRESHOLD DENIABLE SECRET IMAGE SHARING SCHEME WITH LOSSLESS RECOVERY
    Xu, Zikai
    Liu, Bin
    Hu, Fei
    Li, Weihai
    Yu, Nenghai
    2024 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING, ICASSP 2024, 2024, : 3720 - 3724
  • [32] K out of N Secret Sharing Scheme for Gray and Color Images
    Fathimal, P. Mohamed
    Rani, P. Arockia Jansi
    2015 IEEE INTERNATIONAL CONFERENCE ON ELECTRICAL, COMPUTER AND COMMUNICATION TECHNOLOGIES, 2015,
  • [33] Decentralized CRT-Based Efficient Verifiable (n, t, n) Multi-secret Sharing Scheme
    Wen, Wen
    Vaidya, Binod
    Makrakis, Dimitrios
    Adams, Carlisle
    FOUNDATIONS AND PRACTICE OF SECURITY (FPS 2014), 2015, 8930 : 279 - 293
  • [34] A novel multiple-level secret image sharing scheme
    Liu, Yi-Ning
    Zhong, Qi
    Xie, Ming
    Chen, Zu-Bin
    MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 77 (05) : 6017 - 6031
  • [35] A novel proactive secret image sharing scheme based on LISS
    Guo, Cheng
    Zhang, Huan
    Fu, Zhangjie
    Feng, Bin
    Li, Mingchu
    MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 77 (15) : 19569 - 19590
  • [36] (k, n) threshold secret image sharing scheme based on Chinese remainder theorem with authenticability
    Hu, Fei
    Li, Weihai
    Yu, Nenghai
    MULTIMEDIA TOOLS AND APPLICATIONS, 2023, 83 (14) : 40713 - 40732
  • [37] A New k out of n Secret Image Sharing Scheme in Visual Cryptography
    Shankar, K.
    Eswaran, P.
    PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS AND CONTROL (ISCO'16), 2016,
  • [38] Verifiable (2, n) Image Secret Sharing Scheme Using Sudoku Matrix
    Chen, Yi-Hui
    Lee, Jia-Ye
    Chiang, Min-Hsien
    Chen, Shih-Hsin
    SYMMETRY-BASEL, 2022, 14 (07):
  • [39] Progressive (k, n) secret image sharing Scheme with meaningful shadow images by GEMD and RGEMD
    Liu, Yan-Xiao
    Yang, Ching-Nung
    Chou, Yung-Shun
    Wu, Song-Yu
    Sun, Qin-Dong
    JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION, 2018, 55 : 766 - 777
  • [40] (k, n) threshold secret image sharing scheme based on Chinese remainder theorem with authenticability
    Fei Hu
    Weihai Li
    Nenghai Yu
    Multimedia Tools and Applications, 2024, 83 : 40713 - 40732